what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

syscp1215-exec.txt

syscp1215-exec.txt
Posted Feb 8, 2007
Authored by Florian Lippert | Site syscp.org

The System Control Panel (SysCP) suffers from a flaw that allows an attack the ability to inject and execute any code as root. Versions 1.2.15 and below are affected. Details provided.

tags | exploit, root
SHA-256 | d4d314ebfbad52610661cd6d142591a35a7d3d2f221f7a5692e283190df3104e

syscp1215-exec.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The System Control Panel
www.SysCP.org

-= Security Advisory =-


Advisory: Ability to inject and execute any code as root in SysCP
Release Date: 2007/02/02
Last Modified: 2007/02/07
Author: Florian Lippert <florian.lippert@syscp.org>
Application: SysCP <= 1.2.15
Severity: Arbitrary code execution
Risk: Critical
Status: Patch and new release provided


Overview:

SysCP, the System Control Panel is a server administration tool
which enables an internet service provider to give their customers
a web-based application to administrate their email addresses,
their subdomains etc.
Two security issues, both making a remote code execution possible,
were discovered recently:
1) Within the panel, a customer can inject any malicious code which will
be executed by the cronjob, which runs as super user. This security
issue was discovered by Daniel Schulte <daniel@byteways.de> and only
affects SysCP 1.2.15
2) With having access to the syscp-database one could insert any file to
be executed into panel_cronscript table. This security issue was
discovered by Martin Burchert <eremit@syscp.org> and affects all
SysCP releases from 1.2.3 up to 1.2.15.

Details:

1) It's possible for a customer to create a directory-structure like
"; cp /var/www/syscp/lib/userdata.inc.php /var/kunden/webs/web1/; ls "
inside his homedir. If the customer tries to protect this directory with
the control panel, the cronscript will execute this command as root and
the customer has the MySQL-root-password inside his ftp-directory.
2) If an attacker has access to the database he could add any php file to
the table 'panel_cronscript', for example one that he uploaded into his
dir and which adds a new root-user or installs a backdor etc. Due to not
validating or restricting the files which are "include_onced" on
scripts/cronscript.php, line 139 (as of SysCP 1.2.15) this file will be
executed as the user which also executes the cronscript, normally root.

Recommendation:

For security issue #1 patch your installation with the provided patch
(http://files.syscp.org/misc/syscp-1.2.15s.patch) or upgrade to
SysCP 1.2.16, which fixes both security issues.

GPG-Key:
pub 1024D/5B97D56B 2007-02-07 Florian Lippert <flo@syscp.org>
Fingerprint: D974 4762 7993 A16E 4249 7BD5 61D3 9CEE 5B97 D56B

EOF
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (Darwin)

iD8DBQFFykJfYdOc7luX1WsRApFVAJ4oAb6sPFmzvUc3dtrtwmfymsW+6wCggQPy
dP3ag9i/r99Yvs7Dk4JNgDI=
=cqyF
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close